linux_dsm_epyc7002/tools/perf/examples/bpf
Arnaldo Carvalho de Melo 602bce09fb perf augmented_raw_syscalls: Move reading filename to the loop
Almost there, next step is to copy more than one filename payload.

Probably to read syscall arg structs, etc we'll need just a variation of
this that will decide what to use, if probe_read_str() or plain
probe_read for structs, i.e. fixed size.

Cc: Adrian Hunter <adrian.hunter@intel.com>
Cc: Brendan Gregg <brendan.d.gregg@gmail.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Luis Cláudio Gonçalves <lclaudio@redhat.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Link: https://lkml.kernel.org/n/tip-uf6u0pld6xe4xuo16f04owlz@git.kernel.org
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2019-06-05 09:48:55 -03:00
..
5sec.c perf bpf: Add probe() helper to reduce kprobes boilerplate 2018-05-15 14:31:24 -03:00
augmented_raw_syscalls.c perf augmented_raw_syscalls: Move reading filename to the loop 2019-06-05 09:48:55 -03:00
augmented_syscalls.c perf augmented_syscalls: Convert to bpf_map() 2019-01-25 15:12:11 +01:00
empty.c perf bpf: Add license(NAME) helper 2018-05-15 14:31:24 -03:00
etcsnoop.c perf bpf examples: Convert etcsnoop to use bpf_map() 2019-01-25 15:12:11 +01:00
hello.c perf bpf: Add bpf/stdio.h wrapper to bpf_perf_event_output function 2018-08-08 15:55:55 -03:00
sys_enter_openat.c perf bpf: Add 'syscall_enter' probe helper for syscall enter tracepoints 2018-08-08 15:55:44 -03:00